Analysis
-
max time kernel
151s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
20-07-2022 01:34
Static task
static1
Behavioral task
behavioral1
Sample
4cc25b97bb799e0c360bead0b3691b1f.dll
Resource
win7-20220718-en
Behavioral task
behavioral2
Sample
4cc25b97bb799e0c360bead0b3691b1f.dll
Resource
win10v2004-20220414-en
General
-
Target
4cc25b97bb799e0c360bead0b3691b1f.dll
-
Size
5.0MB
-
MD5
4cc25b97bb799e0c360bead0b3691b1f
-
SHA1
c731f3dd7dce8fd91b43222da11ec89241fcc804
-
SHA256
b449d6bc93e72b048050ac5ba066eaec553512b56c1f4873e53fa70660b85d96
-
SHA512
a34c49780f39a86dd7e1dc4532517d415a64d090e46912052df88fcf9365f095cffed343e4e9c84a2fa4c6333abfde208492fd0e5292a524a1e5a9425d599c90
Malware Config
Signatures
-
Wannacry
WannaCry is a ransomware cryptoworm.
-
Contacts a large (1019) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 3 IoCs
Processes:
mssecsvc.exemssecsvc.exetasksche.exepid process 2028 mssecsvc.exe 708 mssecsvc.exe 984 tasksche.exe -
Drops file in System32 directory 1 IoCs
Processes:
mssecsvc.exedescription ioc process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat mssecsvc.exe -
Drops file in Windows directory 2 IoCs
Processes:
mssecsvc.exerundll32.exedescription ioc process File created C:\WINDOWS\tasksche.exe mssecsvc.exe File created C:\WINDOWS\mssecsvc.exe rundll32.exe -
Modifies data under HKEY_USERS 24 IoCs
Processes:
mssecsvc.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadDecisionTime = f058e6a7e99bd801 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\4a-bc-40-ce-d2-8e mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00d1000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3} mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections mssecsvc.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadDecisionReason = "1" mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadDecision = "0" mssecsvc.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{780329E7-A59F-40F9-8B06-5587950E6EE3}\WpadNetworkName = "Network 3" mssecsvc.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e\WpadDecisionTime = f058e6a7e99bd801 mssecsvc.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\4a-bc-40-ce-d2-8e\WpadDecision = "0" mssecsvc.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 1988 wrote to memory of 2024 1988 rundll32.exe rundll32.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe PID 2024 wrote to memory of 2028 2024 rundll32.exe mssecsvc.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cc25b97bb799e0c360bead0b3691b1f.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\4cc25b97bb799e0c360bead0b3691b1f.dll,#12⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2028 -
C:\WINDOWS\tasksche.exeC:\WINDOWS\tasksche.exe /i4⤵
- Executes dropped EXE
PID:984
-
C:\WINDOWS\mssecsvc.exeC:\WINDOWS\mssecsvc.exe -m security1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies data under HKEY_USERS
PID:708
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\WINDOWS\mssecsvc.exeFilesize
3.6MB
MD5084db088c44555d4ccea92651f54cd8e
SHA1b33e3326a90ccc8784e42e167832bb5e4df99bf4
SHA256403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4
SHA51274bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5084db088c44555d4ccea92651f54cd8e
SHA1b33e3326a90ccc8784e42e167832bb5e4df99bf4
SHA256403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4
SHA51274bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559
-
C:\Windows\mssecsvc.exeFilesize
3.6MB
MD5084db088c44555d4ccea92651f54cd8e
SHA1b33e3326a90ccc8784e42e167832bb5e4df99bf4
SHA256403df523df248c6e8a0f39db5194791a1e8bdcee1a41c038fee652b684287be4
SHA51274bdb19b9b0ed1bc2cf1cfd9a5644ef02a778f353843b522393c3b111b5ba80884065181f2e5e25c310c4110d726d37e3cb09a5d164bb3202c3e55f5b09d3559
-
C:\Windows\tasksche.exeFilesize
3.4MB
MD5ca73ed13ce5d8f9b98eafe046d5b2def
SHA1be99e6616e5edd99f7886cd4f89a62f39c3b1e42
SHA256eabb80333df9e51a08be9422133f02592ead62fd677963a7e0ab00aaf56dfc98
SHA51218cfa57c894cf8dfb27d96655953c84133ba5ac755625157592644dd16d9476be458a51f61018b1a1485092b1f4ad9365cb2fb9ccc5a38f0324a1c568a7f31d4
-
memory/2024-54-0x0000000000000000-mapping.dmp
-
memory/2024-55-0x0000000075731000-0x0000000075733000-memory.dmpFilesize
8KB
-
memory/2028-56-0x0000000000000000-mapping.dmp